The CCT Certification covers the most in demand skills required to land a technical, entry level Job in Cybersecurity. Whether you are just getting started or transitioning from an IT role into a Cybersecurity role, CCT proves you have the knowledge and skills required to be a valuable, contributing member of the Cyber Team.
DURATION:
5 Months
The Certified Cybersecurity Technician (C|CT) is an entry-level certification program engineered to address the global need for cybersecurity technicians with strong foundational skills.
This course will get you up to speed starting with basic concepts such as variables, data types, arrays, loops and take you into a deeper Look of MVC.
Scope
The CCT Certification covers the most in demand skills required to land a technical, entry level Job in Cybersecurity. Whether you are just getting started or transitioning from an IT role into a Cybersecurity role, CCT proves you have the knowledge and skills required to be a valuable, contributing member of the Cyber Team. CCT is one of two fully practical certification exams delivered by ECCouncil, the CCT practical is conducted on a live Cyber Range with skill-based objectives, run in a Capture the Flag format.
Target Audience
This course typically includes individuals who are interested in pursuing a career in the field of cybersecurity and have a foundational understanding of computer systems and networking.
Course Content
...Module 01 Information Security Threats and Vulnerabilities
Module 02 Information Security Attacks
Module 03 Identification, Authentication and Authorization
Module 04 Network Security Controls - Technical Controls
Module 05 Network Security Assessment Techniques and Tools
Module 06 Application Security
Module 07 Virtualization and Cloud Computing
Module 08 Mobile Device Security
Module 09 IoT and OT Security
Module 10 Cryptography
Module 11 Data Security
Module 12 Network Troubleshooting
Module 13 Network Traffic Monitoring
Module 14 Network Logs Monitoring and Analysis
Module 15 Incident Response
Module 16 Computer Forensics